Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 14:35
Static task
static1
Behavioral task
behavioral1
Sample
500369c772a931a83fe104ce2a933114_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
500369c772a931a83fe104ce2a933114_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
500369c772a931a83fe104ce2a933114_JaffaCakes118.html
-
Size
10KB
-
MD5
500369c772a931a83fe104ce2a933114
-
SHA1
a54926316c852072602ee1c67dec00242328719b
-
SHA256
24b1bc8771bc5684c8b923cffe9a5ca417bd9b8293cb0cd1bd18949ec2b54c52
-
SHA512
790edb01c8b031353140f3d14732fcf74af6f0883a547e72bb1acf3b93729ff338083e2d9235862d077e06f190026faf6b156e6d3dfcc04bcc2d36e750271f84
-
SSDEEP
192:Szupwbg9Uy2Tfr7blkeh85mTPb0UIjHWmkJ8VN:Szuyg9Uy2TfzeeS5mT41U8VN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422118369" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A49633F1-145A-11EF-8F9A-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000c6ebb1883362dbf55262591b3f4bcb1a6b0b7235440c543982472de8e9c838b4000000000e80000000020000200000000360f94f3fb7192498c34b2aac673e6b804f88b8ba7f3b965f08610a1ecbd036200000003b927f212f95ba82ad5e72970e838ecf071c232c0422fb04d865974d39ecf17040000000e3e8bb324efa4ee666987ace0af2af25d372f1a62044e0b6eaea651218595c91be60938e33ef7ceb9046b6fd607ee2ba087a38e45903f1d5f92025c6a0ffef15 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0b8147967a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1244 iexplore.exe 1244 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2332 1244 iexplore.exe 28 PID 1244 wrote to memory of 2332 1244 iexplore.exe 28 PID 1244 wrote to memory of 2332 1244 iexplore.exe 28 PID 1244 wrote to memory of 2332 1244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\500369c772a931a83fe104ce2a933114_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5140fd72e47f547e26a820524a6eace0b
SHA1bf292f4a68763342b9692b3323d69967286836c4
SHA25682e166874bbdcd7ed0d41b6750719520a0546a9e72647e4bbf072d1a402b9409
SHA5122fee8245bfde806364485549d9479759f138df2b8f37396a5c32a895d214277bce83b90d072fc28cf0e63010bec82db29dd12fe57f0d83854d2c40d84b01f941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5827c186f18c4d21c3d690b6ad5e36c9d
SHA18289af0cb8ce4ca9c8cb68ec12a745131628a7d1
SHA25604d1f043afa2bd3bdf2f60ff516310192ea315ad7a24be899f52adb76860a133
SHA512c8ed1d88af01ddc636d4d15a59cc18b2e938548fbf12b313b44ace9df03c965b102e448059b589c343031a27269fda1b3b5ff02f4c421cd544604f9c556321e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d13650b8b483452e162311a788a72c16
SHA1af52cc246b61851bfa30e6b414d3b4392dec4c9d
SHA256d39cf43696aa4a34f93b9eab3d666b45a47bf6d896d2f3f97e7d63ceecfe07dc
SHA51271aeb36e57d651a5e6d78ab54e5c36b1e2ebb76c2c759366154fdfaea16f17d56cbfad67f185b6f61a4c0eb67b97180e4732a9a86e2c0d9d63ca3b259516d4c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571f439f9d07bf34f16e2dcd60c8aa042
SHA1a435fe418ae821ce2cac336f0f6d38d83c8e1341
SHA256a645d01b5b705d81aee521cf246d2a6144c6d84bf65ec0a84454aef0e7c90fa6
SHA512b2e82fddfaf1a001c17091db73edc0b453e715c48f06229716ce500bce2e525b9beed45aa20cb7c990d249fc253dcfa25d824b695f4309c89c174966ab4bfa93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c305eb4955789657b9b1df9adbebc34b
SHA15f575319b58d3b467994b3abae2a2b0397e0e7ea
SHA25657a06d7e46456b9cb0fc30a42038d1a72ac52f972c2bb34ba3d283cc8243ea96
SHA5124a8732ae785b45ba104d6a8d26b48b6a51a428dbcd863958df967705197d5fb0278db4bd31efa9ff8113f82d178d9fac113e7aaf7878eeb9d347d953c73013ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6646a3dddda2f2a24ea11b740e2eda2
SHA1341b00b3b79e9a6feb8824ef4e52acc883586f50
SHA25691558e17a1daae379cf205c4bfd77bc9923ff38536669894723838bd7e3b4ef2
SHA512c3c9ac80fe9f8654289a1fd8fb43aad8af168731f707e62978a3ea7ab37b8844b5a68faad50698d03d856084ce35b0c9326b5efcdfc4f0fcd55bb99aafd13866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59154f969f7699cf5ebc6cace40b918c3
SHA15477224fba6d92f2dfee1b3e6af15281367137b0
SHA256607808fcd6c9c1bd20c906aa77b722ccd980bea9dd2fcf82ad77ae63926eb8d1
SHA5121a1391d0c8446b117b05e8ebb908cbf333206048667fb7c691595ed5af16efa7611511e692d002bf7646cb8e03fa2fbfcd0f106df31f549f3dcfba64351d6732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a60e6f8038f0bd2d66cb0ff883ed0c4
SHA1dcf7fef145673b1b7817d97b8f8157c9a6b344e3
SHA256603f75f6712083c462ce53402395fba60079f951cbafde2414e664d54f09b5e4
SHA512919981ad6c4e162dc10a0c7fb043df727d44027fbb27f077d21d6980d3afd0605b0d35d024ea2af036c3fb7b936a306a48cf9ac6dbcdfe2cc51b047baf88b51f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515fcfefb4e6cb9a063a7f482681eecb9
SHA13bc0923244d11eef811b7d6fbd07dec33d0f7ec6
SHA2568764d267212ab85759dd80e183ca96492e802fda02851aa3871ee013e9f4c4f5
SHA5127e5c86a16732e5c597816b3e2b9f30e9a7d5145d43e75601b2100411dca59734a29175f4cc616583dc0a55ba6727062c91bdf12c03af9a635fd4eef34aeb63b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5394d874f9437b90d2c8022c87c6edb04
SHA1993d4dadc9285bc7853a981435060523dc4d3b68
SHA2566a9fcca756d97ef28a6e46838645e093684768cb199434ac9d04b306ee22966d
SHA51270da979513121dca44414aed5edcca9d1420e2aa6353b9458469e1bbc7dfbf728912e342cb0125e2ef025e5c2fd7c11e32a1f018230def98c613300fd9c3cbee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541feed4c5d51e47d644ff33848f057ab
SHA1d75bdce374d8ef737cf8792c424eeff25e777b01
SHA256ad85358ab05bab484fd1ae20067874a9f8e0c90fe9fe1ad2e669a94ac29904c1
SHA5120c5219914b6a8c2530278c13e34322761f219b516059b489ff71440e1771c2835c8bd875dc034b8d0d909c38dcc14b7099f930a25827779de09c979e45be2a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc7f4faee0297a034a68d7914394c191
SHA1f0044abf85e614c732e6e74a9ff5dc53e1f199b7
SHA2564d8a6266c1a894f349cf27246df15c9eb0a21b8c17c3757b3ed72d800ee59981
SHA512e7d7eef605a7b8232870d670f4c07ac2da46c2cbf8a637d19d21abcec98f46c106e74c396d56a416a34898871c0b6bb4b0c44c36c9570d54d4d3bb06be9b56aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56241ec782ee31dc92ca0608cf2a0cc97
SHA148ee5ac92726b81fe81d1c98b450ed88926dec5c
SHA25609e85b67df8299c2f3496551af64aaae8bb561f3abb6af87e6ff951339ab48ba
SHA51276bc00d28cad204e61ad037fb57385df890b63cb8beb21b061819c7733716ad5537ecbfb851afc2283fcefa00e39e63dd44b59a288aa7e90272e6d7891bce9d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bf7e7d637248e7da83de65859400334
SHA14fa851b0d54fed10aede15b5e20acbe66df10c77
SHA25681bf3f32468d5e56fa6fb3c3c7be40b04c029f0fc20bd166b2801b14613250cf
SHA512e6fe54461252da1456cf69e81f838dd700dbea642e404c8f88bdd0cea199b70bc4a94ebf3b7f22ac09ea50837e139b8faebcdc88c8298bc9a7c2678922da0eaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e0425c1d11ae341a40c6d22d53249e9
SHA1d38fc64457752d84e63dec4d69d3d8b8595bbf70
SHA2561e556ec51afacac401b356e40442bac57bebc0a618b513e9d7d42c6ea3185c73
SHA5124f2c63437eb3cf89b0520bc766918b282df2df6fb7a1d6c0a88ad5c603e362454ca115e4b3ca4b512618fb4e3b23c30a21771ec5955d59bcf07c4e52e22e4bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544c1c61d02caa721fad28bbba7600e25
SHA1838d604dced29d6f3a1d9f9491f29168b843fa98
SHA25694ee981525f35b164cbaf3170e7685c81b63252c3a5a866f5ca72928f31ad43d
SHA512edc3892ffdb12b3f4aad54a8016fbfc2e9a19073b7c5a54998ec81c307300507261803aaa239c612b4d660f2fcdbe61ce24cd83330038d51d321c032024385c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528df3085bc2e08b9874d7d6ba979caf0
SHA1e01d1848e76fbdbdff4a0e1cdaa2fbddc79e69af
SHA256c998b7d554dd7fe00d42650e1458618b45685ec526248387453160cc404892f5
SHA512081c89b282794f08db595e7210ee0791985edf52e236f30058e8b240694f4fc430bfed4c692b0dde6d4b7e66e740c2e7021f4b7a0eb29dfd47d34cbe7e2b86a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54568461f49f65919853ab60f38904fbf
SHA1557b45ad8fa0e17442bb02612ee179268b57a10f
SHA2568428e8bfdc40ceaa8c876a52eba9aa74d9856fdce473386035749b37958f28c6
SHA512606c17be9e72ca63c5455d5ddbc2ead7ada106476969181fbb7b06af08004b02768d75eb4c0a1a9da5da5422f862b782954d0b177249847dfffcdefbe82a96d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537254de82944b085d73e1fc6c0d50a19
SHA19af656183fb7e1d2ca155c483debff917d1088cd
SHA256dc183397c14cbb552abf8fc025534322c4e20f04ab19d6bfe1b682e2e152c034
SHA512604f857b1b08550a9d3fd2bada3a0e4a5e4b7c92ca1e842e6e13ec9d451f694b1871d273a88e645b2b5af5268bbc1b8a7118d6af51260535dc589f1529312d9e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a